http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Muhammad Awais Ashraf,Shrikant D. Tambe,조은진 대한화학회 2021 Bulletin of the Korean Chemical Society Vol.42 No.4
A copper-catalyzed cascade process has been developed for the synthesis of 3-hydroxypyrrolidine derivatives in a highly diastereoselective manner. The reaction proceeded via borylative allyl copper intermediate formation from allenes; the intermediate underwent intramolecular diastereoselective cyclization followed by cascade copper-catalyzed protodeborylation, to give 3-hydroxypyrrolidines. This method could be extended to the synthesis of six-membered piperidine analogs. A series of control experiments were carried out to confirm the Cu-catalyzed facile protodeborylation of borylated homoallylic alcohols at room temperature.
Ensuring Security in Cloud Computing : Challenges and Mitigation Strategies
Mubeen Iftikhar,Awais Ashraf,Sehrish Aqeel,Gulzar Ahmad,Kanza Fatima,Muhammad Adnan Khan 한국차세대컴퓨팅학회 2023 한국차세대컴퓨팅학회 학술대회 Vol.2023 No.12
This paper delves into the crucial need for robust security measures to protect web services from cyber threats that can compromise their availability, veracity, and privacy. The introduction highlights the inadequacy of existing solutions that are limited to specific use areas and emphasizes the importance of web services being able to respond effectively to assaults and incursions. The related work section discusses the research on web services that has primarily focused on modeling, design, and testing in light of more damaging threats. The methodology section outlines the penetration testing cycle for the SPARCI System, which includes testing for various types of attacks such as DOS, Brut Force Web, Brute Force SSH, Session Hijacking, DNS Spoofing, ARP poisoning, NoSQL Injection, and Memory dump. In this study, we have worked on DOS attacks, and the remaining will be targeted later in the future. The experimental setup includes the necessary instance, Linux system, Python packages, and installed software such as Burp Suite to perform the attack. The results section presents the findings of the penetration testing and the effectiveness of the mitigation strategies employed. The paper concludes that the proposed methodology can be used to identify vulnerabilities in web services and provide recommendations for their mitigation. The study highlights the importance of continuous monitoring and testing of web services to ensure their security and prevent cyber-attacks in terms of identifying and mitigating various vulnerabilities in the existing systems.as.